Analysis
-
max time kernel
298s -
max time network
299s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
10-09-2024 16:21
Static task
static1
Behavioral task
behavioral1
Sample
cYNhXOc.dll
Resource
win7-20240729-en
General
-
Target
cYNhXOc.dll
-
Size
508KB
-
MD5
7bebb1b85a609733df0b3205406723bb
-
SHA1
384f07648c732cd9490b7d3bff41ce5a0911b138
-
SHA256
02846dbf25b333625a0720075fb47da62a946e5b0b4f9e9ba14cef514d576b37
-
SHA512
4147af9ed60d340218deb382374a015a3bb4cc4abc585e833e1a81ba21bf05f485e2a4cfc7b99223e9015ccda993c5ff19693ce7c00fb18701e66cd259422865
-
SSDEEP
6144:pThNEjn8Y+DbK916qEs+9RE3ZiK8jhUIBJawdcM+G7z7oqlpQYkYXlcYS:Zbg8Y+Db7qEs+MJZChUIBMvZA1kGd
Malware Config
Extracted
zloader
july28
july28
https://vlcafxbdjtlvlcduwhga.com/web/post.php
https://softwareserviceupdater3.com/web/post.php
https://softwareserviceupdater4.com/web/post.php
-
build_id
20
Signatures
-
Suspicious use of NtCreateUserProcessOtherParentProcess 1 IoCs
Processes:
regsvr32.exedescription pid process target process PID 3940 created 3496 3940 regsvr32.exe Explorer.EXE -
Suspicious use of SetThreadContext 1 IoCs
Processes:
regsvr32.exedescription pid process target process PID 3940 set thread context of 3924 3940 regsvr32.exe msiexec.exe -
System Location Discovery: System Language Discovery 1 TTPs 2 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
Processes:
regsvr32.exemsiexec.exedescription ioc process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language regsvr32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language msiexec.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
Processes:
regsvr32.exepid process 3940 regsvr32.exe 3940 regsvr32.exe -
Suspicious use of AdjustPrivilegeToken 3 IoCs
Processes:
regsvr32.exemsiexec.exedescription pid process Token: SeDebugPrivilege 3940 regsvr32.exe Token: SeSecurityPrivilege 3924 msiexec.exe Token: SeSecurityPrivilege 3924 msiexec.exe -
Suspicious use of WriteProcessMemory 8 IoCs
Processes:
regsvr32.exeregsvr32.exedescription pid process target process PID 4624 wrote to memory of 3940 4624 regsvr32.exe regsvr32.exe PID 4624 wrote to memory of 3940 4624 regsvr32.exe regsvr32.exe PID 4624 wrote to memory of 3940 4624 regsvr32.exe regsvr32.exe PID 3940 wrote to memory of 3924 3940 regsvr32.exe msiexec.exe PID 3940 wrote to memory of 3924 3940 regsvr32.exe msiexec.exe PID 3940 wrote to memory of 3924 3940 regsvr32.exe msiexec.exe PID 3940 wrote to memory of 3924 3940 regsvr32.exe msiexec.exe PID 3940 wrote to memory of 3924 3940 regsvr32.exe msiexec.exe
Processes
-
C:\Windows\Explorer.EXEC:\Windows\Explorer.EXE1⤵PID:3496
-
C:\Windows\system32\regsvr32.exeregsvr32 /s C:\Users\Admin\AppData\Local\Temp\cYNhXOc.dll2⤵
- Suspicious use of WriteProcessMemory
PID:4624 -
C:\Windows\SysWOW64\regsvr32.exe/s C:\Users\Admin\AppData\Local\Temp\cYNhXOc.dll3⤵
- Suspicious use of NtCreateUserProcessOtherParentProcess
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:3940
-
-
-
C:\Windows\SysWOW64\msiexec.exemsiexec.exe2⤵
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
PID:3924
-